وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Capture the Flag (CTF) – intermediate Level Training

سرفصل های دوره

Finding and exploiting Linux vulnerabilities and misconfigurations to gain a root shell.


1 - Booting Up Kali Linux
  • 1 - Installing kali Linux and vmware workstation

  • 2 - Metasploit Framework
  • 2 - 1Metasploit Framework About Metasploit
  • 3 - 2Metasploit Framework Metasploitable Machine
  • 4 - 3Metasploit Framework Footprinting
  • 5 - 4Metasploit Framework Scanning
  • 6 - 5Metasploit Framework Exploiting FTP
  • 7 - 6Metasploit Framework Exploiting RMI

  • 3 - Basic Linux Commands For Pentesters
  • 8 - 1Linux Commands for Pentesters
  • 9 - 2Linux Commands for Pentesters

  • 4 - Basic Linux penetration Testing
  • 10 - 1Basic Penetration Testing on Linux Base Machine
  • 11 - 2Basic Penetration Testing Lab setup
  • 12 - 3Basic Penetration Testing FootPrinting and scanning
  • 13 - 4basic Penetration Testing Backdoor Webserver
  • 14 - 5Baisc Penetration Testing Gaining shell
  • 15 - 6Basic Penetration Testing Gaining root Access

  • 5 - Basic Linux penetration Testing2
  • 16 - 1Basic Linux penetration Testing2intro
  • 17 - 2Basic Linux penetration Testing2Scanning
  • 18 - 3Basic Linux penetration Testing2initial Access
  • 19 - 4Basic Linux penetration Testing2Uploading Shell
  • 20 - 5Basic Linux penetration Testing2Privilege escalation

  • 6 - Basic Linux penetration Testing3
  • 21 - 1Basic Linux penetration Testing3 introduction
  • 22 - 2Basic Linux penetration Testing3 scanning
  • 23 - 3Basic Linux penetration Testing3 Password Cracking
  • 24 - 4Basic Linux penetration Testing3 initial access
  • 25 - 5Basic Linux penetration Testing3 initial access2
  • 26 - 6Basic Linux penetration Testing3 Privilege escalation

  • 7 - Linux Penetration Testing CTF
  • 27 - 1Linux Penetration Testing setup Lab
  • 28 - 2Linux Penetration Testing Scanning
  • 29 - 3Linux Penetration Testing User Enumeration
  • 30 - 4Linux Penetration Testing Bruteforce Attack
  • 31 - 5Linux Penetration Testing Gaining shell access
  • 32 - 6Linux Penetration Testing Privilege escalation to User
  • 33 - 7Linux Penetration Testing Privilege escalation

  • 8 - Linux Penetration Testing Beginner Level
  • 34 - 1Linux Penetration Testing Beginner LevelCTF1
  • 35 - 2Linux Penetration Testing Beginner LevelCTF2
  • 36 - 3Linux Penetration Testing Beginner LevelCTF3
  • 37 - 4Linux Penetration Testing Beginner LevelCTF4

  • 9 - Windows Penetration Testing Beginner Level
  • 38 - 1Windows Penetration Testing Beginner Level setup
  • 39 - 2Windows Penetration Testing Beginner Level scanning
  • 40 - 3Windows Penetration Testing Beginner Level capture flag
  • 41 - 4Windows Penetration Testing Beginner Level Initial Access
  • 42 - 5Windows Penetration Testing Beginner Level Privilege escalation
  • 43 - 6Windows Penetration Testing Beginner Level Flag

  • 10 - Windows Penetration Testing Intermediate Level
  • 44 - 1Windows Penetration Testing IntermediatelevelIntroduction
  • 45 - 2Windows Penetration Testing IntermediatelevelScanning
  • 46 - 3Windows Penetration Testing IntermediatelevelInitial Access
  • 47 - 4Windows Penetration Testing IntermediatelevelExplore
  • 48 - 5Windows Penetration Testing IntermediatelevelPrivilege escalation
  • 49 - 6Windows Penetration Testing IntermediatelevelPrivilege escalation 2

  • 11 - Linux Penetration Testing Intermediate Level
  • 50 - 1Linux Penetration Testing Intermediate Level introduction
  • 51 - 2Linux Penetration Testing Intermediate Level Scanning
  • 52 - 3Linux Penetration Testing Intermediate Level Initial Access
  • 53 - 4Linux Penetration Testing Intermediate Level Initial Access2
  • 54 - 5Linux Penetration Testing Intermediate Level initial Access3
  • 55 - 6Linux Penetration Testing Intermediate Level Initial Access4Exploiting
  • 56 - 7Linux Penetration Testing Intermediate Level Exploiting executable
  • 57 - 8Linux Penetration Testing Intermediate Level Exploiting Executable
  • 58 - 9Linux Penetration Testing Intermediate Level Privilege escalation
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 294
    حجم: 2775 مگابایت
    مدت زمان: 363 دقیقه
    تاریخ انتشار: 22 دی 1401
    دسته بندی محصول
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید